Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Commitment Scheme and PRNGExplores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Cryptanalysis: Public-KeyExplores cryptanalysis in public-key cryptography, covering attacks, algorithms, and security models.
Signal: Security AnalysisExplores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Cryptography FundamentalsCovers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.